🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔍 Disk Forensics

MBR Analysis, File Carving, Timeline Reconstruction, Deleted File Recovery

Her ex forgot his computer. That’s how Fremont woman found the ‘pedophile manual,’ police say
mercurynews.com·1d
🗜️ZIP Forensics
Under or over? Automated technique can visualize and measure DNA tangles
phys.org·1d
🕸️Algebraic Topology
Modern Solution: Convicted IT expert files constitutional complaint
heise.de·2d
🔓Hacking
F.B.I. Searched Home of John Bolton, a Former Trump Adviser
nytimes.com·1d
🛡Cybersecurity
Short circuit: Electronics supplier to tech giants suffers ransomware shutdown
theregister.com·1d
🔓Hacking
Beyond the Hype: Critical Takeaways From BlackHat and Defcon
thenewstack.io·1d
🎯Threat Hunting
July 2025 Detection Highlights: 7 New VMRay Threat Identifiers, Config Extractors for 4 malware families, and 35+ fresh YARA rules.
vmray.com·5d
🦠Malware Analysis
Show HN: Telescopo – View any file beautifully on your Mac
apps.apple.com·2d·
Discuss: Hacker News
🔠Terminal Fonts
Peeking Under the Hood of Cursor's API Calls
proxymock.io·1d·
Discuss: Hacker News
🔌Archive APIs
One Is Eager, Another Is a Bootlicker, and the Other Is Unhinged: Decoding the Personalities of AI
hackernoon.com·1d
🔓Hacking
Artificial Intelligence-Based Multiscale Temporal Modeling for Anomaly Detection in Cloud Services
arxiv.org·2d
🧠Machine Learning
Quick background and Demo on kagent - Cloud Native Agentic AI - with Christian Posta and Mike Petersen
youtube.com·1d
🏠Homelab Archaeology
LangExtract + Knowledge Graph— Google’s New Library for NLP Tasks
dev.to·1d·
Discuss: DEV
📄Text Chunking
AI Is at the PageRank Moment
twkrr.com·8h·
Discuss: Hacker News
🤖AI Curation
AI Agents Need Data Integrity
schneier.com·1d·
Discuss: www.schneier.com
🛡️Preservation Proofs
Desync the Planet – Rsync Remote Code Execution
phrack.org·4d·
Discuss: Lobsters
🌳Archive Merkle Trees
Tearing Apart the Undetected (OSX)Coldroot RAT
objective-see.com·2d
📟Terminal Forensics
Shortcuts for the Long Run: Automated Workflows for Aspiring Data Engineers
kdnuggets.com·1d
🌊Stream Processing
Kidney dialysis firm DaVita confirms ransomware attack compromised data of 2.7M people
securityaffairs.com·5h
🚨Incident Response
Show HN: Implement BLAKE3 with Awk
github.com·1d·
Discuss: Hacker News
🔐Hash Functions
Loading...Loading more...
AboutBlogChangelogRoadmap